home/dictionary/framework/SEC IM Guidance Update: Cybersecurity Guidance, No. 2015-02

Dictionary · SEC IM Guidance Update: Cybersecurity Guidance, No. 2015-02

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
54 senses under SEC IM Guidance Update: Cybersecurity Guidance, No. 2015-02

Verbs

11 senses
assist

To give support or aid to someone, typically by doing a share of the work; help.

control

To exercise authority over; direct; regulate. This include exercising authority over the processesses of issuance and revocation, management, and auditing.

reduce

To make smaller or less in amount, degree , or size.

create

To bring something or cause to come into existence; originate; make; design.

protect

To shield or defend from danger, harm, injury, loss, destruction, or damage.

identify

To establish, indicate, or verify who or what someone or something is.

implement

To put a plan, policy, decision, agreement, etc. into action or effect.

educate

To give or provide with information or intellectual, social, or moral instruction; inform.

mitigate

To lessen or to try to lessen the severity, pain, seriousness, extent, or gravity of.

comply

To act in accordance with a wish, command, law, standard, or contractual obligation.

conduct

To manage, control, or organize and carry out.

Nouns

43 senses
Cyber Attack

A cyberspace attack targeting an enterprises use of cyberspace to disrupt, disable, destroy, or maliciously control a computing environment or infrastructure; or destroy the integrity of the data or steal controlled information.

access

The ability, right, or permission to approach, enter, speak with someone, or use something.

location

A particular point or position in space.

loss

The fact or process of being deprived of or ceasing to have or retain something.

nature

The basic or inherent qualities, characteristics, or features of something.

periodic assessment

An assessment that is conducted on a regular interval.

scope

The extent or boundary to which a process, configuration item, application, contract, etc. applies.

security control

A safeguard or countermeasure to avoid, counteract or minimize security risks relating to personal property, or any company property. For business-to-business facing organizations whose service may affect the financial statements of the other company, the prospect may require successful audit reports of policy controls.

security process

A series of actions that ensure the protection of data.

sensitive data

Information whose loss, misuse, unauthorized access to, modification, or destruction, could adversely affect the national interest or the conduct of federal programs, or privacy to which individuals are entitled, but which has not been specifically authorized to be kept secret in the interest of national defense or foreign policy, etc.

Sensitivity

A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.

system

An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.

tailor

Make or adapt for a particular purpose or person.

business

A usually commercial or mercantile activity engaged in as a means of livelihood.

Client

A person or organization using the services of a company or professional person, such as a lawyer, psychologist, financial advisor, etc.

compliance policy

An official expression of principles that direct an organization's approach to compliance.

compliance procedure

A detailed description of the steps necessary to implement or perform something in conformance with applicable standards.

compliance program

Compliance programs aim to prevent, and where necessary, identify and respond to, breaches of laws, regulations, codes or organizational standards occurring in the organization; and promote a culture of compliance within the organization.

compliance requirement

The various legal, contractual, and service level requirements that an organization must follow.

compliance risk

The risk to current and prospective earnings that arises from violating or not acting in accordance with laws, rules, regulations, prescribed practices, or ethical standards.

Compromise

To bring into danger, suspicion, or disrepute.

cyber threat

A potential cyber attack, which may be assigned a probability of occurrence that can be used for cyber risk assessment.

cyber incident response procedure

A documented series of steps that are taken to detect, triage, and resolve events regarding cybersecurity that disrupt operations and alert applicable personnel and clients in conformance with pertinent standards.

cybersecurity policy

A set of criteria for the provision of security services.

cybersecurity vulnerability

A flaw in a organization's system which leaves it exposed to and defenseless against a cyberthreat.

cyber threat response strategy

A plan of action designed to achieve a long-term or overall aim regarding how to resolve cyber incidents.

cybersecurity risk management

The process of identifying risks and vulnerabilities and applying administrative actions and comprehensive solutions to ensure that the organization is adequately protected.

cybersecurity training

Activities that are used to teach people about tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

data backup

The physical copying of data files to a removable storage device that allows the data to be stored in another location.

data encryption

The reversible transformation of data from the original, plain text, version to a difficult-to-interpret format for security purposes.

development

The process of growing, advancing, or elaborate.

effectiveness

The capacity to accomplish a purpose or function as intended.

exfiltration

The unauthorized file transfer or other bulk data transfer that creates a security breach by allowing malicious people outside a security perimeter access to confidential information.

exposure

The potential loss or compromise to an area caused by an adverse event.

federal securities law

Consists of a handful of laws passed between 1933 and 1940, as well as legislation enacted in 1970. The federal laws stem from Congress's power to regulate interstate commerce. Therefore the laws are generally limited to transactions involving transportation or communication using interstate commerce or the mail.

governance structure

Specifies the distribution of rights and responsibilities among different participants in the corporation, such as the board, managers, shareholders and other stakeholders, and spells out the rules and procedures for making decisions on corporate affairs.

Impact

In Information Security: the magnitude of harm that can be expected to result from unauthorized disclosure, modification, or destruction of information, loss of information or loss of information system availability.

include

Make part of a whole or set.

Incident response plan

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization's IT systems(s).

information

Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.

Information Technology system

Information technology systems are collectively the equipment used to create, store and transmit digital data and any related software owned (or otherwise controlled) and used by the State and its agencies to fulfill its service and obligations to the citizens of Arizona.

investor

A person who commits capital in order to gain financial returns.